
SonicWall Capture Labs threats researchers observed an interesting Android sample that passes itself as a WhatsApp Updater app. Anyone with basic security awareness will quickly point that there is no separate app to update WhatsApp as clearly stated on the WhatsApp FAQ. As expected this app simply uses WhatsApp as a disguise to hide its spyware capabilities.
This fake updater app (at the time of writing this blog) is hosted on android-update[.]net/whatsapp-update.apk. Installation of apps from unknown sources is blocked by default on Android devices, as a result whenever an apk file is downloaded the user is shown a warning stating that it might be dangerous to install said app. This website tries to convince the user to ignore that warning and states that WhatsApp update is completely safe to install:
The site android-update.net has been deemed malicious on Virustotal
This app requests for a few permissions that can be risky in the wrong hands:
After installation and execution the app is prompt in requesting for device admin privileges. This alone should be a red flag as WhatsApp itself does not request device admin privileges:
If the permission is not granted immediately, the app keeps requesting for the permission until its granted. This tactic is aimed towards ruining the user experience and forcing the user into granting the permission.
The app communicates with the server - superwat.biz - and begins ex-filtrating sensitive user related information from the device and the network. We have listed a few of these exchanges:
The communication begins with a POST message to the folder settings which signifies the different options/switches under which the app (which now shows indications of being a spyware) will operate:
Some noteworthy switches:
There was a POST message to the folder DeviceInfo which sent device related data:
There was a POST message to the folder Put with high sensitivity data that included:
Few more interesting network messages:
We created a VirusTotal relations graph that represents all the parties that were contacted by the spyware app
We found the following artifacts about the server superwat.biz and android-update.net:
SonicWall Capture Labs provides protection against this threat via the following signature:
Share This Article

An Article By
An Article By
Security News
Security News